General
-
Target
139daba4920df2b28eee8d3726b98528455c3002a0c91bdaf82bbac8a678d924
-
Size
743KB
-
Sample
250125-bvw58azncm
-
MD5
b2e13b5a8173ef717d056a348001e4cc
-
SHA1
ebd6d6d14aaaaf47cb891406b834d5505e088271
-
SHA256
139daba4920df2b28eee8d3726b98528455c3002a0c91bdaf82bbac8a678d924
-
SHA512
ec8fecc4f545980209fd4a81187ff3cbec224ddf568bf007dba99b86daf4d48b1538e8fcc13ccb85b6e1000ecfcc7e25c6a92c17fa50dcb53da41784d181d91e
-
SSDEEP
12288:iDCu7+JNLLzmHjR/Qw1iO116TWWaQjqF0UKWx2l+g05MjFvP990MeU4KBomWf:z/JlLKDRQwt4abQGF9xs+g0uFvwUlGmE
Static task
static1
Behavioral task
behavioral1
Sample
139daba4920df2b28eee8d3726b98528455c3002a0c91bdaf82bbac8a678d924.exe
Resource
win7-20241010-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.magnatextile.com - Port:
587 - Username:
[email protected] - Password:
ow%{&}mti{&}$is - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.magnatextile.com - Port:
587 - Username:
[email protected] - Password:
ow%{&}mti{&}$is
Targets
-
-
Target
139daba4920df2b28eee8d3726b98528455c3002a0c91bdaf82bbac8a678d924
-
Size
743KB
-
MD5
b2e13b5a8173ef717d056a348001e4cc
-
SHA1
ebd6d6d14aaaaf47cb891406b834d5505e088271
-
SHA256
139daba4920df2b28eee8d3726b98528455c3002a0c91bdaf82bbac8a678d924
-
SHA512
ec8fecc4f545980209fd4a81187ff3cbec224ddf568bf007dba99b86daf4d48b1538e8fcc13ccb85b6e1000ecfcc7e25c6a92c17fa50dcb53da41784d181d91e
-
SSDEEP
12288:iDCu7+JNLLzmHjR/Qw1iO116TWWaQjqF0UKWx2l+g05MjFvP990MeU4KBomWf:z/JlLKDRQwt4abQGF9xs+g0uFvwUlGmE
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1